infynon 0.2.0-beta.6.2 โ†’ 0.2.0-beta.6.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/README.md +60 -547
  2. package/package.json +2 -3
package/README.md CHANGED
@@ -1,617 +1,130 @@
1
- <p align="center">
2
- <h1 align="center">๐Ÿ›ก๏ธ INFYNON</h1>
3
- <p align="center">
4
- <strong>Network Firewall & Dependency Security Manager</strong><br/>
5
- Real-time reverse proxy WAF with TUI dashboard + pre-install CVE verification for 14 ecosystems.
6
- </p>
7
- </p>
8
-
9
- <p align="center">
10
- <a href="https://github.com/d4rkNinja/infynon-cli/stargazers">
11
- <img src="https://img.shields.io/github/stars/d4rkNinja/infynon-cli?style=for-the-badge" />
12
- </a>
13
- <a href="https://github.com/d4rkNinja/infynon-cli/issues">
14
- <img src="https://img.shields.io/github/issues/d4rkNinja/infynon-cli?style=for-the-badge" />
15
- </a>
16
- <a href="https://github.com/d4rkNinja/infynon-cli/blob/main/LICENSE">
17
- <img src="https://img.shields.io/github/license/d4rkNinja/infynon-cli?style=for-the-badge" />
18
- </a>
19
- <img src="https://img.shields.io/badge/ecosystems-14-blue?style=for-the-badge" />
20
- <img src="https://img.shields.io/badge/lockfiles-15-purple?style=for-the-badge" />
21
- <img src="https://img.shields.io/badge/version-0.2.0--beta.6.2-orange?style=for-the-badge" />
22
- <a href="https://www.npmjs.com/package/infynon">
23
- <img src="https://img.shields.io/npm/v/infynon?style=for-the-badge&logo=npm&label=npm" />
24
- </a>
25
- <a href="https://github.com/d4rkNinja/infynon-cli/tree/development">
26
- <img src="https://img.shields.io/badge/channel-development-blueviolet?style=for-the-badge" />
27
- </a>
28
- </p>
29
-
30
- <p align="center">
31
- <strong>๐Ÿšซ AI generates code, installs packages โ€” you don't know what's compromised</strong><br/>
32
- <strong>โœ… INFYNON catches it before it touches your system</strong>
33
- </p>
34
-
35
- <p align="center">
36
- <a href="#-quick-start">Quick Start</a> โ€ข
37
- <a href="#-why-infynon">Why INFYNON</a> โ€ข
38
- <a href="#-how-it-works">How It Works</a> โ€ข
39
- <a href="#-key-features">Features</a> โ€ข
40
- <a href="#-firewall-mode-v020">Firewall</a> โ€ข
41
- <a href="#-installation">Install</a> โ€ข
42
- <a href="#-development-channel">Dev Channel</a> โ€ข
43
- <a href="https://cli.infynon.com/docs">Docs</a>
44
- </p>
1
+ # INFYNON
45
2
 
46
- ---
47
-
48
- ## โšก What is INFYNON?
49
-
50
- INFYNON is a **security CLI** written in Rust with two modes:
51
-
52
- 1. **`infynon` โ€” Network Firewall**: A real-time reverse proxy WAF that sits between the internet and your backend. Inspects, filters, and blocks HTTP traffic with a TUI dashboard. Self-hosted Cloudflare alternative.
53
- 2. **`infynon pkg` โ€” Package Security**: A pre-installation firewall for dependencies across 14 ecosystems. Stops compromised packages before they touch your system.
54
-
55
- ### The Problem INFYNON Solves
56
-
57
- **In the age of vibe coding and AI-generated code**, developers and AI tools install packages without knowing if they're compromised. An AI assistant writes `npm install some-package` โ€” but that package could be:
58
-
59
- - **Typosquatted** (looks like a real package, isn't)
60
- - **Supply-chain attacked** (legitimate package, now hijacked)
61
- - **Carrying known CVEs** that nobody checked
62
-
63
- By the time `npm audit` tells you something is wrong, it's already on your disk. **INFYNON intercepts the install command itself** โ€” scanning before the package ever reaches your machine.
64
-
65
- ### `infynon` โ€” Network Firewall (v0.2.0)
66
-
67
- ```
68
- Internet โ†’ INFYNON Firewall โ†’ Nginx / App Server โ†’ Your Application
69
- ```
70
-
71
- A self-hosted Cloudflare WAF โ€” IP filtering, rate limiting, SQL injection detection, XSS protection, custom rules, maintenance mode, multi-upstream routing, all with a real-time TUI monitor.
72
-
73
- ### `infynon pkg` โ€” Package Security
74
-
75
- A **pre-installation firewall for dependencies**.
76
-
77
- Traditional tools like `npm audit`, `pip audit`, or Dependabot:
78
- - scan **after installation** โ€” the damage is already done
79
- - notify you **after exposure** โ€” too late
80
- - require manual remediation โ€” wastes your time
81
-
82
- > `infynon pkg` **intercepts the install command**, analyzes dependencies in real-time,
83
- > and blocks or fixes vulnerabilities *before they enter your system*.
84
- > Whether you typed the command or an AI did โ€” INFYNON has your back.
85
-
86
- ---
87
-
88
- ## ๐ŸŽฏ Why INFYNON?
89
-
90
- ### The Problem
3
+ **Network Firewall & Dependency Security Manager**
91
4
 
92
- - **AI tools generate install commands** โ€” developers approve without checking
93
- - **Vibe coding** means moving fast, not verifying every dependency
94
- - Supply chain attacks are increasing (typosquatting, malicious updates, hijacked packages)
95
- - Traditional tools are **reactive** โ€” they tell you AFTER the compromise
96
- - Your server is exposed to scanners, bots, and attacks 24/7 without a WAF
5
+ Real-time reverse proxy WAF with TUI dashboard + pre-install CVE verification for 14 ecosystems.
97
6
 
98
- ---
99
-
100
- ### The Shift
101
-
102
- INFYNON introduces **preventive security** at two levels:
7
+ [![npm](https://img.shields.io/npm/v/infynon?style=flat-square&logo=npm)](https://www.npmjs.com/package/infynon)
8
+ [![License: MIT](https://img.shields.io/badge/license-MIT-blue?style=flat-square)](https://github.com/d4rkNinja/infynon-cli/blob/main/LICENSE)
9
+ [![GitHub](https://img.shields.io/badge/source-GitHub-black?style=flat-square&logo=github)](https://github.com/d4rkNinja/infynon-cli)
103
10
 
104
- | Without INFYNON | With INFYNON |
105
- |-----------------|-------------|
106
- | AI runs `npm install x` โ†’ compromised package installed โ†’ `npm audit` finds it later | AI runs `infynon pkg npm install x` โ†’ CVE detected โ†’ blocked before install |
107
- | Internet โ†’ Your server โ†’ attacked | Internet โ†’ INFYNON WAF โ†’ filtered โ†’ Your server |
108
-
109
- This prevents:
110
- - compromised packages entering your codebase (whether installed by you or AI)
111
- - SQL injection, XSS, and bot attacks hitting your backend
112
- - production risks caused by unnoticed CVEs
11
+ > AI generates code, installs packages โ€” you don't know what's compromised.
12
+ > **INFYNON catches it before it touches your system.**
113
13
 
114
14
  ---
115
15
 
116
- ## โš™๏ธ How It Works
117
-
118
- 1. **Intercept install command**
119
- ```bash
120
- infynon pkg npm install express
121
- ```
122
-
123
- 2. **Resolve dependency tree**
124
-
125
- * Detects ecosystem automatically
126
- * Parses lock files or registry metadata
127
-
128
- 3. **Query vulnerability database**
129
-
130
- * Uses **OSV.dev** for real CVE intelligence
131
- * Batch scans all dependencies
132
-
133
- 4. **Analyze & classify**
134
-
135
- * Severity levels (Critical / High / Medium / Low)
136
- * Affected versions
137
- * Suggested safe upgrades
138
-
139
- 5. **Interactive decision layer**
140
-
141
- * Approve / Skip / Upgrade per package
142
- * Apply rules globally
143
-
144
- 6. **Execute safe installation**
145
-
146
- * Only installs approved or fixed packages
147
-
148
- ---
149
-
150
- ## ๐Ÿš€ Key Features
151
-
152
- ### ๐Ÿ” Security First
153
-
154
- * **Pre-install CVE scanning**
155
- * Blocks vulnerable packages before execution
156
- * OSV-powered vulnerability intelligence
157
-
158
- ### ๐ŸŒ Multi-Ecosystem Support
16
+ ## Install
159
17
 
160
- Supports **14 ecosystems**:
161
-
162
- ```
163
- npm โ€ข yarn โ€ข pnpm โ€ข bun
164
- pip โ€ข uv โ€ข poetry
165
- cargo โ€ข go
166
- gem โ€ข composer โ€ข nuget
167
- hex โ€ข pub
18
+ ```bash
19
+ npm install -g infynon
168
20
  ```
169
21
 
170
- ---
171
-
172
- ### ๐Ÿง  Smart Detection
22
+ Downloads the right pre-built native binary for your OS and architecture automatically. Requires Node.js 14+.
173
23
 
174
- * Auto-detects ecosystem from project files
175
- * Supports **15+ lock file formats**
176
- * Works without configuration
24
+ **Supported platforms:** Windows x64 ยท Linux x64 ยท Linux ARM64 ยท macOS x64 ยท macOS ARM64
177
25
 
178
- ---
179
-
180
- ### โšก Developer Experience
181
-
182
- * Interactive install prompts
183
- * Minimal friction workflow
184
- * Single binary โ€” no setup required
185
-
186
- ---
187
-
188
- ### ๐Ÿ› ๏ธ Auto Remediation
189
-
190
- * `infynon pkg fix --auto` upgrades all vulnerable dependencies
191
- * `infynon pkg scan --fix high` targets critical + high only
192
- * Suggests safe versions from OSV.dev
193
-
194
- ---
195
-
196
- ### ๐Ÿšซ CI Enforcement
26
+ To uninstall and clean up all config files:
197
27
 
198
28
  ```bash
199
- infynon pkg --strict npm install express
29
+ npm uninstall -g infynon
200
30
  ```
201
31
 
202
- * Fails build on any vulnerability
203
- * Ideal for pipelines and teams
204
-
205
32
  ---
206
33
 
207
- ### ๐Ÿ“„ Reporting
34
+ ## What is INFYNON?
208
35
 
209
- * Export results as Markdown or PDF
210
- * Includes CVE details, severity breakdown, upgrade suggestions
36
+ A single binary with two modes:
211
37
 
212
- ---
38
+ ### 1. `infynon pkg` โ€” Package Security
213
39
 
214
- ### ๐Ÿ”ฌ Dependency Intelligence
215
-
216
- | Command | Description |
217
- |---------|-------------|
218
- | `infynon pkg audit` | Recursive dependency tree with CVE annotations |
219
- | `infynon pkg why <pkg>` | Trace why a package is in your tree |
220
- | `infynon pkg outdated` | Detect outdated deps across all ecosystems |
221
- | `infynon pkg diff <pkg> v1 v2` | Compare versions: size, deps, scripts, CVEs |
222
- | `infynon pkg doctor` | Health check: dupes, unused, phantoms, missing locks |
223
- | `infynon pkg size <pkg>` | Install weight and transitive dep count |
224
- | `infynon pkg search <query>` | Cross-ecosystem search (npm, crates, PyPI, โ€ฆ) |
225
- | `infynon pkg clean` | Find and remove unused dependencies |
226
- | `infynon pkg migrate <from> <to>` | Migrate between package managers |
227
- | `infynon pkg eagle-eye setup` | Interactive setup for scheduled CVE monitoring |
228
- | `infynon pkg eagle-eye start` | Start Eagle Eye scheduled vulnerability scanner |
229
- | `infynon pkg eagle-eye status` | Show Eagle Eye configuration and status |
230
- | `infynon pkg eagle-eye enable/disable` | Toggle Eagle Eye monitoring |
231
-
232
- ---
233
-
234
- ## ๐Ÿ‘€ Demo
235
-
236
- ### ๐Ÿ”Ž Dependency Scan
237
-
238
- <p align="center">
239
- <img src="assets/scan-demo.png" width="750"/>
240
- </p>
241
-
242
- ### ๐Ÿ›ก๏ธ Secure Installation Flow
243
-
244
- <p align="center">
245
- <img src="assets/install-demo.png" width="750"/>
246
- </p>
247
-
248
- ---
249
-
250
- ## โšก Quick Start
40
+ Intercepts install commands across **14 ecosystems** and runs a 3-layer CVE check before anything touches your disk.
251
41
 
252
42
  ```bash
253
- # Scan project dependencies for CVEs
43
+ # Scan your project's lock files for CVEs
254
44
  infynon pkg scan
255
45
 
256
- # Secure install โ€” any ecosystem
46
+ # Secure install โ€” intercepts and checks before running npm
257
47
  infynon pkg npm install express
48
+
49
+ # Works with any ecosystem
258
50
  infynon pkg cargo add serde
259
51
  infynon pkg pip install requests
52
+ infynon pkg yarn add lodash
260
53
 
261
54
  # Auto-fix all vulnerable dependencies
262
55
  infynon pkg fix --auto
263
56
 
264
- # Deep audit with dependency tree
57
+ # Deep audit with full dependency tree
265
58
  infynon pkg audit
266
59
 
267
- # Why is a package in the tree?
268
- infynon pkg why lodash
269
-
270
- # Check for outdated deps
271
- infynon pkg outdated
272
-
273
- # Compare two versions of a package
274
- infynon pkg diff express 4.17.1 4.18.2
275
-
276
- # Dependency health check
277
- infynon pkg doctor
278
-
279
- # Package size & weight
280
- infynon pkg size express
281
-
282
- # Cross-ecosystem search
283
- infynon pkg search http-client
284
-
285
- # Remove unused deps
286
- infynon pkg clean
287
-
288
- # Migrate npm โ†’ pnpm
289
- infynon pkg migrate npm pnpm
290
-
291
- # Export PDF report
292
- infynon pkg scan --output pdf
293
-
294
- # Strict mode for CI
60
+ # Strict mode โ€” fail build on any vulnerability (great for CI)
295
61
  infynon pkg --strict npm install express
296
62
  ```
297
63
 
298
- ---
299
-
300
- ## ๐Ÿ”ฅ Installation
301
-
302
- ### npm (recommended โ€” works on all platforms)
303
-
304
- ```bash
305
- npm install -g infynon
306
- ```
307
-
308
- Downloads the right pre-built binary for your OS and architecture automatically. Requires Node.js 14+.
309
-
310
- To uninstall completely (removes binary + all config files from `~/.infynon/`):
311
-
312
- ```bash
313
- npm uninstall -g infynon
314
- ```
315
-
316
- ---
317
-
318
- ### Linux / macOS (shell script)
319
-
320
- ```bash
321
- curl -fsSL https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.sh | bash
322
- ```
323
-
324
- ### Windows (PowerShell)
64
+ **Ecosystems:** npm ยท yarn ยท pnpm ยท bun ยท pip ยท uv ยท poetry ยท cargo ยท go ยท gem ยท composer ยท nuget ยท hex ยท pub
325
65
 
326
- ```powershell
327
- irm https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.ps1 | iex
328
- ```
66
+ ### 2. `infynon` โ€” Network Firewall
329
67
 
330
- ### Using Cargo (build from source)
68
+ A reverse proxy WAF with a real-time TUI dashboard. Sits between the internet and your backend.
331
69
 
332
70
  ```bash
333
- cargo install --git https://github.com/d4rkNinja/infynon-cli
334
- ```
335
-
336
- ---
337
-
338
- ## ๐Ÿงฌ Philosophy
339
-
340
- > Security should not be an afterthought.
341
- > It should be enforced by default.
342
-
343
- INFYNON ensures that:
344
-
345
- * every dependency is verified โ€” whether installed by you or an AI
346
- * every HTTP request is inspected before reaching your backend
347
- * every project remains secure by design, not by afterthought
348
-
349
- ---
350
-
351
- ## ๐Ÿ”ฅ Firewall Mode (v0.2.0)
352
-
353
- INFYNON now includes a **real network firewall** โ€” a reverse proxy that inspects, filters, and blocks HTTP traffic in real time.
354
-
355
- ### Quick Start โ€” Firewall
356
-
357
- ```bash
358
- # Initialize configuration
71
+ # Initialize config
359
72
  infynon init --port 8080 --upstream-port 3000
360
73
 
361
74
  # Start firewall with TUI dashboard
362
75
  infynon start
363
76
 
364
- # Start in headless mode (no TUI)
77
+ # Start headless (no TUI โ€” for servers)
365
78
  infynon start --headless
366
79
 
367
- # View status
368
- infynon status
369
-
370
80
  # Block an IP
371
81
  infynon block 203.0.113.50
372
82
 
373
- # View logs
374
- infynon logs --verdict block --count 100
375
-
376
- # Validate config
377
- infynon config check
378
-
379
- # Show effective config
380
- infynon config show
381
-
382
- # Enable/disable rules
383
- infynon rules list
384
- infynon rules enable my-rule
385
- infynon rules disable my-rule
83
+ # View blocked requests
84
+ infynon logs --verdict block
386
85
  ```
387
86
 
388
- ### Firewall Features
389
-
390
- | Feature | Description |
391
- |---------|-------------|
392
- | **Reverse Proxy** | Sits between internet and your backend, forwards clean traffic |
393
- | **Multi-Upstream Routing** | Route requests to different backends based on path prefix |
394
- | **IP Filtering** | Blocklist, allowlist, CIDR range blocking |
395
- | **Auto-Reputation** | Automatically bans IPs that get blocked too many times |
396
- | **Rate Limiting** | Per-IP, per-path, and global rate limits with sliding window |
397
- | **WAF Engine** | SQL injection, XSS, path traversal, command injection, header injection detection |
398
- | **Custom Rules** | IF-THEN rules with combinable conditions and priority ordering |
399
- | **Maintenance Mode** | Toggle maintenance page for all visitors (from TUI or config) |
400
- | **TUI Dashboard** | 7 real-time views: Dashboard, Live Feed, Blocked, IP Inspector, Rules, Stats, Config |
401
- | **Live Config Editing** | Edit all firewall settings directly from the TUI with instant apply |
402
- | **Hot Config Reload** | Edit `infynon.toml` โ€” changes auto-detected and applied within seconds |
403
- | **Email Alerts** | SMTP/AWS SES notifications on suspicious activity + daily digest reports |
404
- | **JSONL Logging** | Structured event logging with separate blocked request log |
405
- | **Cross-Platform** | Works on Linux, macOS, and Windows |
406
-
407
- ### Multi-Upstream Routing
408
-
409
- Route different paths to different backend services:
410
-
411
- ```toml
412
- # Default upstream (catches everything not matched by routes)
413
- [upstream]
414
- address = "127.0.0.1"
415
- port = 3000
416
-
417
- # Additional upstreams for path-based routing
418
- [[upstreams]]
419
- name = "api-server"
420
- path_prefix = "/api"
421
- address = "127.0.0.1"
422
- port = 4000
423
- strip_prefix = false
424
-
425
- [[upstreams]]
426
- name = "static-server"
427
- path_prefix = "/static"
428
- address = "127.0.0.1"
429
- port = 5000
430
- strip_prefix = true
431
- ```
432
-
433
- ### TUI Views
434
-
435
- | Key | View | Description |
436
- |-----|------|-------------|
437
- | `1` | Dashboard | Live stats, sparklines, top IPs, top rules, recent events |
438
- | `2` | Live Feed | All requests in real time with search and filtering |
439
- | `3` | Blocked | Blocked requests with rule, stage, and reason details |
440
- | `4` | IP Inspector | Search any IP โ€” see full history, block/unblock from TUI |
441
- | `5` | Rules | Custom rules with hit counts + built-in WAF status |
442
- | `6` | Stats | Traffic breakdown, verdicts, status codes, top paths |
443
- | `7` | Config | Edit all settings directly โ€” save to file with `s` |
444
-
445
- ### TUI Keyboard Shortcuts
446
-
447
- | Key | Action |
448
- |-----|--------|
449
- | `1-7` | Switch between views |
450
- | `q` | Quit TUI (firewall keeps running in headless mode) |
451
- | `/` | Search/filter events |
452
- | `?` | Show help overlay |
453
- | `r` | Reload config from file |
454
- | `m` | Toggle maintenance mode |
455
- | `p` | Pause/resume live feed auto-scroll |
456
- | `f` | Cycle feed filter (All/Blocked/Allowed/Flagged) |
457
- | `b` | Block selected IP (in IP Inspector) |
458
- | `u` | Unblock selected IP (in IP Inspector) |
459
- | `Enter` | Edit config field (in Config view) |
460
- | `s` | Save config to file (in Config view) |
461
-
462
- ### Configuration
463
-
464
- Run `infynon init` for interactive setup, or create `infynon.toml` manually. The config supports:
465
-
466
- - **Server**: listen address, port, max connections, timeouts, maintenance mode
467
- - **Upstream**: default backend + multiple path-based upstreams
468
- - **IP Filtering**: blocklist/allowlist modes, CIDR ranges, auto-reputation banning
469
- - **Rate Limiting**: global, per-IP, per-path sliding window limits
470
- - **WAF**: SQLi, XSS, path traversal, command injection, header injection detection
471
- - **Custom Rules**: named rules with conditions (IP, path, method, header, body, content-type, size) and actions (block, allow, flag, rate_limit)
472
- - **Logging**: JSONL access/blocked/alert logs with rotation
473
- - **TUI**: refresh rate, default view, theme, max events in memory
474
- - **Responses**: custom block/rate-limit/maintenance pages
475
- - **Email**: SMTP or AWS SES notifications โ€” alert on block threshold, IP ban, daily digest
476
-
477
- Config can be edited from the TUI (view 7) or directly in the file. Changes to the file are auto-detected and hot-reloaded within seconds.
478
-
479
- ### Email Notifications
480
-
481
- Configure email alerts to get notified about suspicious activity:
482
-
483
- ```toml
484
- [email]
485
- enabled = true
486
- provider = "smtp" # "smtp" or "ses"
487
- from = "firewall@example.com"
488
- to = ["admin@example.com"]
489
- alert_on_block_threshold = 100 # Alert when blocks/min > 100
490
- alert_on_ip_ban = true # Alert when IP is auto-banned
491
- daily_digest = true # Daily summary at 8:00 UTC
492
- daily_digest_hour = 8
493
-
494
- [email.smtp]
495
- host = "smtp.gmail.com"
496
- port = 587
497
- username = "your-email@gmail.com"
498
- password = "your-app-password"
499
- tls = true
500
- ```
501
-
502
- Emails are sent with styled HTML templates showing top blocked IPs, triggered rules, and traffic statistics.
503
-
504
- ### Eagle Eye โ€” Scheduled Package Monitoring
505
-
506
- Eagle Eye is a scheduled vulnerability scanner for `infynon pkg`. It monitors multiple project directories on a timer, scans all lock files for CVEs, and sends email alerts when vulnerabilities matching your risk threshold are found.
507
-
508
- ```bash
509
- # Interactive setup โ€” configure SMTP, paths, risk level, schedule
510
- infynon pkg eagle-eye setup
511
-
512
- # Start monitoring (runs in foreground)
513
- infynon pkg eagle-eye start
514
-
515
- # Check current configuration
516
- infynon pkg eagle-eye status
517
-
518
- # Enable/disable monitoring
519
- infynon pkg eagle-eye enable
520
- infynon pkg eagle-eye disable
521
- ```
522
-
523
- **Features:**
524
- - Monitor multiple project directories simultaneously
525
- - Configurable scan interval (default: every 24 hours)
526
- - Risk level threshold: choose which severities trigger alerts (CRITICAL, HIGH, MEDIUM, LOW, ALL)
527
- - SMTP email alerts with styled HTML templates showing per-project vulnerability breakdown
528
- - Enable/disable toggle without losing configuration
529
- - Config stored in `~/.infynon/eagle-eye.toml`
87
+ **Protects against:** SQL injection ยท XSS ยท path traversal ยท command injection ยท header injection ยท rate abuse ยท bad IPs
530
88
 
531
89
  ---
532
90
 
533
- ## โš ๏ธ Current Scope
534
-
535
- INFYNON currently focuses on:
91
+ ## How It Works (Package Security)
536
92
 
537
- * **Firewall**: Reverse proxy WAF with real-time TUI monitoring, multi-upstream routing, maintenance mode
538
- * **Package Security**: Known vulnerabilities (CVE-based detection), pre-install interception
539
- * **Cross-platform**: Single binary for Linux, macOS, Windows
93
+ 1. You (or an AI tool) runs `infynon pkg npm install express`
94
+ 2. INFYNON resolves the full dependency tree
95
+ 3. Queries **OSV.dev** for known CVEs across all packages
96
+ 4. Presents an interactive decision for any vulnerable package โ€” block, skip, or install a fixed version
97
+ 5. Only approved packages get installed
540
98
 
541
99
  ---
542
100
 
543
- ## ๐Ÿงช Development Channel
544
-
545
- Want to try the latest features before they hit stable? Follow the **development** branch:
546
-
547
- ```bash
548
- # Clone the development branch
549
- git clone -b development https://github.com/d4rkNinja/infynon-cli.git
550
- cd infynon-cli
101
+ ## More Commands
551
102
 
552
- # Build from source
553
- cargo build --release
554
-
555
- # Or install directly from development branch
556
- cargo install --git https://github.com/d4rkNinja/infynon-cli --branch development
557
- ```
558
-
559
- The `development` branch contains:
560
- - Bleeding-edge features still under testing
561
- - Firewall TUI improvements and new views
562
- - Experimental WAF rules and pipeline stages
563
- - Performance optimizations before release
564
-
565
- > **Note**: The development branch may have breaking changes. For production use, stick to tagged releases on `main`.
566
-
567
- **Watch the branch** for updates: [github.com/d4rkNinja/infynon-cli/tree/development](https://github.com/d4rkNinja/infynon-cli/tree/development)
103
+ | Command | Description |
104
+ |---------|-------------|
105
+ | `infynon pkg scan` | Scan lock files for CVEs |
106
+ | `infynon pkg fix --auto` | Auto-upgrade all vulnerable deps |
107
+ | `infynon pkg audit` | Full dependency tree with CVE annotations |
108
+ | `infynon pkg why <pkg>` | Trace why a package is in your tree |
109
+ | `infynon pkg outdated` | Find outdated deps across all ecosystems |
110
+ | `infynon pkg diff <pkg> v1 v2` | Compare versions: size, deps, CVEs |
111
+ | `infynon pkg doctor` | Health check: dupes, unused, phantoms |
112
+ | `infynon pkg size <pkg>` | Install weight and transitive dep count |
113
+ | `infynon pkg search <query>` | Cross-ecosystem package search |
114
+ | `infynon pkg clean` | Remove unused dependencies |
115
+ | `infynon pkg migrate <from> <to>` | Migrate between package managers |
116
+ | `infynon pkg eagle-eye setup` | Set up scheduled CVE monitoring with email alerts |
568
117
 
569
118
  ---
570
119
 
571
- ## ๐Ÿค– Claude Code Plugin
572
-
573
- INFYNON integrates with [Claude Code](https://claude.ai/code) via official plugins. Once installed, Claude Code automatically knows how to help you use every INFYNON command โ€” scanning, fixing, firewall setup, rule authoring, and more.
574
-
575
- ### Install the Plugin
576
-
577
- ```bash
578
- # 1. Add the Code Guardian marketplace
579
- /plugin marketplace add d4rkNinja/code-guardian
580
-
581
- # 2. Install INFYNON plugins
582
- /plugin install infynon-pkg@d4rkNinja
583
- /plugin install infynon-firewall@d4rkNinja
584
-
585
- # 3. Reload to activate
586
- /reload-plugins
587
- ```
588
-
589
- ### What You Get
590
-
591
- | Plugin | What Claude Code Learns |
592
- |--------|------------------------|
593
- | **infynon-pkg** | All `infynon pkg` commands โ€” scan, fix, audit, why, outdated, diff, doctor, size, search, clean, migrate, eagle-eye. Auto-triggers when it detects lock files in your project. |
594
- | **infynon-firewall** | All `infynon` firewall commands โ€” init, start, monitor, block/unblock, rules, logs, config. Full `infynon.toml` configuration guide, TUI shortcuts. Auto-triggers when it detects `infynon.toml`. |
595
-
596
- Once installed, just ask Claude Code things like:
597
- - *"Scan my project for vulnerabilities"*
598
- - *"Set up a firewall for my Express backend on port 3000"*
599
- - *"Fix all critical CVEs in this project"*
600
- - *"Help me write a custom WAF rule to block scanners"*
120
+ ## Full Documentation
601
121
 
602
- Claude Code will recommend and explain the right `infynon` commands.
122
+ **[cli.infynon.com/docs](https://cli.infynon.com/docs)**
603
123
 
604
- > **Plugin source**: [github.com/d4rkNinja/code-guardian](https://github.com/d4rkNinja/code-guardian)
124
+ Source: [github.com/d4rkNinja/infynon-cli](https://github.com/d4rkNinja/infynon-cli)
605
125
 
606
126
  ---
607
127
 
608
- ## ๐Ÿ”ฎ Upcoming
128
+ ## License
609
129
 
610
- * Geo-IP blocking (MaxMind GeoLite2 integration)
611
- * SQLite event database for historical queries
612
- * Webhook alerts (Slack, Discord, email)
613
- * LLM-based deep inspection (Layer 3 โ€” local Ollama)
614
- * AI-powered anomaly detection and rule suggestion
615
- * SBOM generation (CycloneDX) after every install
616
- * TLS termination support
617
- * Health check endpoints
130
+ MIT
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "infynon",
3
- "version": "0.2.0-beta.6.2",
3
+ "version": "0.2.0-beta.6.3",
4
4
  "description": "Universal package security manager & network firewall โ€” intercepts installs across npm, pip, cargo, go, gem and more with 3-layer CVE verification, plus a real-time reverse proxy WAF with TUI dashboard",
5
5
  "bin": {
6
6
  "infynon": "./run.js",
@@ -13,8 +13,7 @@
13
13
  "files": [
14
14
  "run.js",
15
15
  "postinstall.js",
16
- "preuninstall.js",
17
- "README.md"
16
+ "preuninstall.js"
18
17
  ],
19
18
  "engines": {
20
19
  "node": ">=14"